I find myself reading an article this morning titled “ Court: No warrant needed to search cell phone ”, posted by Bob Sullivan on MSNBC’s the Red Tape Chronicles and wondering how ECM, ERM, content security and disposition would play into the scenario presented
The second insight showed that the principal obstacles to moving to the cloud remain the same: availability, security and data loss. In regards to security, 80% of organizations were not considering a move to Office 365 because of the security issue and vulnerability of eMail in the cloud
What about taxonomic structure, metadata strategies and security schemes? Are these in place and appropriate to meet the needs of the organization?
One of the things to be aware of is that while SharePoint appears to be simple to implement and use, there are challenges associated with it that need to be addressed like governance, consistent and standardized practices, taxonomic structure, metadata and security. This means that as an organization you need to find a balance between the flexibility it offers and control over its use
Did the pilot give us a false sense of security because of more motivated pilot users?
What needs to be done now, is to prepare by establishing governance that addresses appropriate use, security, capture and access in the same way you would internally using desktop PCs
Legislation will change the way we need to conduct business and new regulatory guidelines will be put in place adding new levels of compliance to be met. Security and tighter controls over our information management practices will increase and governance over appropriate use of social media for business purposes will take center stage
Aside from the obvious security issues in the fact that I along with many others could hear the discussion, the term co-creation caught my attention and made me begin to think about the connection with SharePoint
Parting Fact: Particularly for many small and medium sized businesses, the hosted model can lead to better agility and security, along more streamlined IT resources (and therefore costs)
1 Comment - no search term matches found in comments.
Cover your bleep – Email is often used to create a “paper” trail or to document various interactions. Privacy and Security – Email offers a way to converse with one person, or many, all in a relatively private way, something that is not always readily available through social media.
8403 Colesville Rd #1100Silver Spring, MD 20910USA
Phone: (301) 587-8202Toll free: (800) 477-2446Fax: (301) 587-2711Email: hello@aiim.org
JoinBenefitsLearn More
About UsTerms of Use